Loading…

Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding

Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Li...

Full description

Saved in:
Bibliographic Details
Published in:Circuits, systems, and signal processing systems, and signal processing, 2021-09, Vol.40 (9), p.4370-4406
Main Authors: Folifack Signing, V. R., Fozin Fonzin, T., Kountchou, M., Kengne, J., Njitacke, Z. T.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23
cites cdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23
container_end_page 4406
container_issue 9
container_start_page 4370
container_title Circuits, systems, and signal processing
container_volume 40
creator Folifack Signing, V. R.
Fozin Fonzin, T.
Kountchou, M.
Kengne, J.
Njitacke, Z. T.
description Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.
doi_str_mv 10.1007/s00034-021-01665-1
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2557918541</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2557918541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EEqXwA6wssQ7MJHYSL6tQaBGCRVvEznJSu00hD2xH0L8nJUjsWM2MdO4d6RByiXCNAMmNA4CIBRBiABjHPMAjMkIeYcDTJD0mIwiTNIAUX0_JmXM7ABRMhCPykm1V48uCPmj7Rhd753VFP0u_pbOuaunC267wndXUNJYu9Zenql7TeaU2mk7rwu5bXzY1Xbmy3tDbpwnNmnW_npMTo96dvvidY7K6my6zWfD4fD_PJo9BEaHwASYRi6HIY-AJE5AkmAuhjIiRmdQoCA2HXEXCQH_yda4wxzwUgjGFUazCaEyuht7WNh-ddl7ums7W_UsZcp4ITDnDngoHqrCNc1Yb2dqyUnYvEeTBnxz8yd6f_PEnD6FoCLkerjfa_lX_k_oGibdxTw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2557918541</pqid></control><display><type>article</type><title>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</title><source>Springer Nature</source><creator>Folifack Signing, V. R. ; Fozin Fonzin, T. ; Kountchou, M. ; Kengne, J. ; Njitacke, Z. T.</creator><creatorcontrib>Folifack Signing, V. R. ; Fozin Fonzin, T. ; Kountchou, M. ; Kengne, J. ; Njitacke, Z. T.</creatorcontrib><description>Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.</description><identifier>ISSN: 0278-081X</identifier><identifier>EISSN: 1531-5878</identifier><identifier>DOI: 10.1007/s00034-021-01665-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Behavior ; Chaos theory ; Circuits and Systems ; Cryptography ; Data encryption ; Digital data ; Digital imaging ; Electrical Engineering ; Electronics and Microelectronics ; Engineering ; Equilibrium ; Exchanging ; Image coding ; Instrumentation ; Medical imaging ; Military engineering ; Military satellites ; Multimedia ; Nonlinear analysis ; Satellite imagery ; Security ; Signal processing ; Signal,Image and Speech Processing</subject><ispartof>Circuits, systems, and signal processing, 2021-09, Vol.40 (9), p.4370-4406</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</citedby><cites>FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</cites><orcidid>0000-0002-8385-8058</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Folifack Signing, V. R.</creatorcontrib><creatorcontrib>Fozin Fonzin, T.</creatorcontrib><creatorcontrib>Kountchou, M.</creatorcontrib><creatorcontrib>Kengne, J.</creatorcontrib><creatorcontrib>Njitacke, Z. T.</creatorcontrib><title>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</title><title>Circuits, systems, and signal processing</title><addtitle>Circuits Syst Signal Process</addtitle><description>Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.</description><subject>Algorithms</subject><subject>Behavior</subject><subject>Chaos theory</subject><subject>Circuits and Systems</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Digital data</subject><subject>Digital imaging</subject><subject>Electrical Engineering</subject><subject>Electronics and Microelectronics</subject><subject>Engineering</subject><subject>Equilibrium</subject><subject>Exchanging</subject><subject>Image coding</subject><subject>Instrumentation</subject><subject>Medical imaging</subject><subject>Military engineering</subject><subject>Military satellites</subject><subject>Multimedia</subject><subject>Nonlinear analysis</subject><subject>Satellite imagery</subject><subject>Security</subject><subject>Signal processing</subject><subject>Signal,Image and Speech Processing</subject><issn>0278-081X</issn><issn>1531-5878</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kMtOwzAQRS0EEqXwA6wssQ7MJHYSL6tQaBGCRVvEznJSu00hD2xH0L8nJUjsWM2MdO4d6RByiXCNAMmNA4CIBRBiABjHPMAjMkIeYcDTJD0mIwiTNIAUX0_JmXM7ABRMhCPykm1V48uCPmj7Rhd753VFP0u_pbOuaunC267wndXUNJYu9Zenql7TeaU2mk7rwu5bXzY1Xbmy3tDbpwnNmnW_npMTo96dvvidY7K6my6zWfD4fD_PJo9BEaHwASYRi6HIY-AJE5AkmAuhjIiRmdQoCA2HXEXCQH_yda4wxzwUgjGFUazCaEyuht7WNh-ddl7ums7W_UsZcp4ITDnDngoHqrCNc1Yb2dqyUnYvEeTBnxz8yd6f_PEnD6FoCLkerjfa_lX_k_oGibdxTw</recordid><startdate>20210901</startdate><enddate>20210901</enddate><creator>Folifack Signing, V. R.</creator><creator>Fozin Fonzin, T.</creator><creator>Kountchou, M.</creator><creator>Kengne, J.</creator><creator>Njitacke, Z. T.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>S0W</scope><orcidid>https://orcid.org/0000-0002-8385-8058</orcidid></search><sort><creationdate>20210901</creationdate><title>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</title><author>Folifack Signing, V. R. ; Fozin Fonzin, T. ; Kountchou, M. ; Kengne, J. ; Njitacke, Z. T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Behavior</topic><topic>Chaos theory</topic><topic>Circuits and Systems</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Digital data</topic><topic>Digital imaging</topic><topic>Electrical Engineering</topic><topic>Electronics and Microelectronics</topic><topic>Engineering</topic><topic>Equilibrium</topic><topic>Exchanging</topic><topic>Image coding</topic><topic>Instrumentation</topic><topic>Medical imaging</topic><topic>Military engineering</topic><topic>Military satellites</topic><topic>Multimedia</topic><topic>Nonlinear analysis</topic><topic>Satellite imagery</topic><topic>Security</topic><topic>Signal processing</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Folifack Signing, V. R.</creatorcontrib><creatorcontrib>Fozin Fonzin, T.</creatorcontrib><creatorcontrib>Kountchou, M.</creatorcontrib><creatorcontrib>Kengne, J.</creatorcontrib><creatorcontrib>Njitacke, Z. T.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest Science Journals</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><collection>DELNET Engineering &amp; Technology Collection</collection><jtitle>Circuits, systems, and signal processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Folifack Signing, V. R.</au><au>Fozin Fonzin, T.</au><au>Kountchou, M.</au><au>Kengne, J.</au><au>Njitacke, Z. T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding</atitle><jtitle>Circuits, systems, and signal processing</jtitle><stitle>Circuits Syst Signal Process</stitle><date>2021-09-01</date><risdate>2021</risdate><volume>40</volume><issue>9</issue><spage>4370</spage><epage>4406</epage><pages>4370-4406</pages><issn>0278-081X</issn><eissn>1531-5878</eissn><abstract>Nowadays, advances in technology have led to the expansion of the use and exchange of digital data, which places great importance on the security of these data. The protection of exchanging messages, passwords of email accounts, bank accounts and many others requires the security of textual data. Likewise, the security of medical images, personal images, captures from military satellites, plans to build banks and many others require the protection of digital images. Thereby, jointly based on the special randomness generated by a chaotic Jerk system with hump structure and DNA coding, a cryptosystem is proposed in this article for both text and image encryption. A preliminary study on the dynamic properties of a Jerk system as well as DNA coding is carried out, respectively, for the exploration of the phenomena and the implementation of the encryption technique. Through standard nonlinear analysis tools, the full dynamics of the system is explored and feasibility is confirmed through PSpice investigations. The simulated experimental results, as well as the security analysis, show quantitatively and qualitatively that the proposed encryption technique does not only offer better performance in comparison with some existing algorithms but is also sufficiently fast for practical applications while resisting the known attacks but also.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s00034-021-01665-1</doi><tpages>37</tpages><orcidid>https://orcid.org/0000-0002-8385-8058</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0278-081X
ispartof Circuits, systems, and signal processing, 2021-09, Vol.40 (9), p.4370-4406
issn 0278-081X
1531-5878
language eng
recordid cdi_proquest_journals_2557918541
source Springer Nature
subjects Algorithms
Behavior
Chaos theory
Circuits and Systems
Cryptography
Data encryption
Digital data
Digital imaging
Electrical Engineering
Electronics and Microelectronics
Engineering
Equilibrium
Exchanging
Image coding
Instrumentation
Medical imaging
Military engineering
Military satellites
Multimedia
Nonlinear analysis
Satellite imagery
Security
Signal processing
Signal,Image and Speech Processing
title Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T10%3A29%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Chaotic%20Jerk%20System%20with%20Hump%20Structure%20for%20Text%20and%20Image%20Encryption%20Using%20DNA%20Coding&rft.jtitle=Circuits,%20systems,%20and%20signal%20processing&rft.au=Folifack%20Signing,%20V.%20R.&rft.date=2021-09-01&rft.volume=40&rft.issue=9&rft.spage=4370&rft.epage=4406&rft.pages=4370-4406&rft.issn=0278-081X&rft.eissn=1531-5878&rft_id=info:doi/10.1007/s00034-021-01665-1&rft_dat=%3Cproquest_cross%3E2557918541%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-173460cb6057490771b99af9614f8fa02f50ba39f0f8f5dba1b1b29944a136a23%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2557918541&rft_id=info:pmid/&rfr_iscdi=true